Artur Rot | Wroclaw University of Economics (original) (raw)

Artur  Rot

Head of Department of Information Systems at Wroclaw University of Economics, researcher, academic lecturer.
Dr. Artur Rot is an Assistant Professor at Wroclaw University of Economics, Head of Information Systems Department. Academic lecturer, researcher, industry consultant and author. Rector’s Attorney in WASK Network Users Board (2016- now). Dr. Artur Rot was board member of the Scientific Society of Business Informatics - NTIE (2007-2015), member of IAENG (International Association of Engineers).

He is author of over 90 publications. His research interests are grounded in the realities of the IT industry. His areas of past and current interest cover: information systems security management, IT risk management, IT Governance.

He serves in Programm Committees of following conferences: International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), International Conference on Enterprises Information Systems (ICEIS), Federated Conference on Computer Science and Information Systems (FedCSIS), Emerging Aspects in Information Security (EAIS) and many others.

Visiting scholars:
- State University of New York at Albany (SUNY), USA (2012)
- University at Albany, NY, USA (2012),
- Polytechnic Institute of Setúbal, Portugal (2011),
- Technical University of Lisbon, Portugal (2011),
- Katholieke Universiteit Leuven, Belgium (2007),
- Northwestern University, USA (2014),
- University of St. Gallen, Switzerland (2014).

Reviewer of articles on many international conferences.

Courses taught: Information Systems Security, Computer Networks and Security, Information Technologies, Computer Science in Management, Fundamentals of Information Systems, Management Information Systems, System Analysis & Design, etc.

less

Uploads

Papers by Artur Rot

Research paper thumbnail of IT Risk Assessment: Quantitative and Qualitative Approach

— IT risk management currently plays more and more important role in almost all aspects of contem... more — IT risk management currently plays more and more important role in almost all aspects of contemporary organizations ’ functionality. It requires reliable and cyclical realization of its key task which is risk analysis. Literature of subject presents problems of risk analysis in different way, the most often skipped or selectively treated the problem of quantitative methods application for the purpose of risk analysis. The article presents the issue of one of the most significant stages of risk analysis which is IT risk assessment, especially focusing on chosen quantitative methods such as ALE (Annual Loss Expected) method, Courtney method, Fisher’s method, using survey research ISRAM model (Information Security Risk Analysis Method) and other derived ratios. There were also shortly presented chosen qualitative methods – FMEA (Failure Mode and Effects Analysis) and FMECA (Failure Mode and Effects Criticality Analysis), NIST SP 800-30 method and CRAMM methodology. Index Terms — IT r...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Towards Automated Modelling of Large-scale Cybersecurity Transformations: Potential Model and Methodology

Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Potential of the Internet of Things in Knowledge Management System

Annals of Computer Science and Information Systems, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Development of crowd investing on the basis of ICO crypto assets using block-options for the supply of electric generation capacity

Communication Papers of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Wybrane determinanty rozwoju rynku rynku informatycznego w Polsce

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Towards Industry 4.0: Functional and Technological Basis for ERP 4.0 Systems

Towards Industry 4.0 — Current Challenges in Information Systems, 2020

In the Industry 4.0 conception, due to the development of new information technologies and their ... more In the Industry 4.0 conception, due to the development of new information technologies and their implementation in management systems, there are developed systems with extended functionalities, new functional features and new technologies such as, for example, the Internet of Things, fog computing, big data, big management. These are ERP 4.0 systems. They increase the scope of automation and even robotize information processes, they are also able to transform information into knowledge, which increases the efficiency of decision-making processes and thus increases the efficiency of enterprises and organizations. The main aim of the chapter is to identify and discuss the features in the newly emerging ERP 4.0 system and also to analyze and classify the main contributions published on the topic of ERP 4.0 in management literature, seeking to give it a unique definition, discover the gaps still remaining in literature and outline future avenues of research in this domain. The main contribution of the chapter is developing the guidelines for structural and technological development of ERP-class systems, with particular emphasis on technological solutions of the ERP 4.0 system, such as cognitive technologies, big data, the Internet of Things, cloud computing and fog computing. The Authors attempts also to formulate a unique definition and features of the ERP system and outline future research directions in this area.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Business Challenges and Technological Innovations Applied in the ICT Platform for Occupational Activation of Senior Citizens

Proceedings of the 4th International Conference on Information and Communication Technologies for Ageing Well and e-Health, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Platforma internetowa jako innowacyjne narzędzie aktywizacji seniorów na rynku pracy

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection

Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of models for the tokenization of electric power industry basing on the blockchain technology

Communication Papers of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Genetic Algorithm for the Retailers’ Shelf Space Allocation Profit Maximization Problem

Applied Sciences, 2021

This paper discusses the problem of retailers’ profit maximization regarding displaying products ... more This paper discusses the problem of retailers’ profit maximization regarding displaying products on the planogram shelves, which may have different dimensions in each store but allocate the same product sets. We develop a mathematical model and a genetic algorithm for solving the shelf space allocation problem with the criteria of retailers’ profit maximization. The implemented program executes in a reasonable time. The quality of the genetic algorithm has been evaluated using the CPLEX solver. We determine four groups of constraints for the products that should be allocated on a shelf: shelf constraints, shelf type constraints, product constraints, and virtual segment constraints. The validity of the developed genetic algorithm has been checked on 25 retailing test cases. Computational results prove that the proposed approach allows for obtaining efficient results in short running time, and the developed complex shelf space allocation model, which considers multiple attributes of a...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Software Quality Improvement by Application of a Component-Based Software Meta-Architecture

Designing software is a complex process which requires a lot of knowledge and experience. Every s... more Designing software is a complex process which requires a lot of knowledge and experience. Every software has a high-level architecture which can be represented as a set of taken design decisions. Software meta-architectures, architectural styles, and reference models are commonly used tools which help to shape the software architectures by delivering sets of already taken, and validated design decisions. The STCBMER is a component-based software meta-architecture founded on a set of simple pieces of architectural knowledge, called architectural principles. The authors of this publication have defined the STCBMER and its principles in previous works. The main aim and the contribution of this paper is to look for a correlation between a component-based software meta-architecture (STCBMER) and software quality attributes.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Bezpieczeństwo Internetu rzeczy. Wybrane zagrożenia i sposoby zabezpieczeń na przykładzie systemów produkcyjnych

Streszczenie: W opinii wielu ekspertów oraz firm analitycznych zagadnienia takie jak cyfryzacja, ... more Streszczenie: W opinii wielu ekspertów oraz firm analitycznych zagadnienia takie jak cyfryzacja, bezpieczeństwo IT oraz Internet rzeczy to zjawiska, które wyznaczały kierunek rozwoju poszczególnym branżom gospodarki w minionym roku i będą szczególnie istotne w przyszłości. Wśród nich znajduje się Internet rzeczy, wobec którego oczekuje się, że znajdzie wiele zastosowań w różnych dziedzinach, m.in. w energetyce, transporcie, przemyśle, opiece zdrowotnej. Jego zastosowania usprawniają nasze życie, ale stwarzają też nowe zagrożenia i stanowią wyzwanie dla architektów systemów bezpieczeństwa. Eksperci są zdania, że problemy z bezpieczeństwem IT sprzed lat powracają obecnie w nowych urządzeniach i dają hakerom wiele możliwości do cyberataków. Celem artykułu jest przybliżenie koncepcji Internetu rzeczy, obszarów jej zastosowań, ale przede wszystkim identyfikacja zagrożeń wynikających z zastosowań tej koncepcji. Artykuł zawiera również przegląd przypadków użycia Internetu rzeczy w obszarze produkcji, opis zagrożeń dla cyberbezpieczeństwa wynikających z poszerzania dostępu do sieci nowych urządzeń, a także przegląd istniejących zabezpieczeń w tej dziedzinie.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Wirtualizacja zasobów informatycznych organizacji. Analiza korzyści i wybranych programowych narzędzi wirtualizacyjnych

Streszczenie: Wirtualizacja została szybko zaadaptowana przez współczesne organizacje, gdyż oferu... more Streszczenie: Wirtualizacja została szybko zaadaptowana przez współczesne organizacje, gdyż oferuje wiele korzyści. Dzięki niej można uprościć istniejące środowisko IT, two-rząc przy tym dynamiczniejsze i bardziej elastyczne centrum przetwarzania danych o wysokim poziomie bezpieczeństwa, przy jednoczesnym obniżeniu nakładów inwesty-cyjnych oraz kosztów operacyjnych. Systemy do wirtualizacji są wciąż udoskonalane, zwiększane jest spektrum ich możliwości, co przyczynia się do coraz większego zaintere-sowania tymi rozwiązaniami. Obecnie na rynku istnieje wiele rozwiązań programowych wspomagających procesy wirtualizacji, które różnią się między sobą pod wieloma wzglę-dami. Celem artykułu jest przedstawienie istoty, podstawowych typów wirtualizacji, jej zastosowań i korzyści oraz popularnych systemów wirtualizacyjnych stosowanych w praktyce. Zastosowane metody badawcze to przegląd aktualnej literatury przedmiotu, analiza istniejących badań i wybranych przypadków zastosowań wirtualizacji oraz analiza przydatności wdrożenia omawianej technologii w praktyce. Wprowadzenie Różne organizacje badawcze zajmujące się analizą rynku IT publikują opraco-wania, w których określają trendy w branży nowoczesnych technologii na najbliż-sze lata. W raportach tych coraz modniejsze staje się pojęcie " disruptive innovation " , które określa nowe technologie mające szansę zmienić sposób funkcjono-wania organizacji, zmieniając diametralnie dotychczasowy porządek ekonomiczny. Wśród tych trendów w obszarze IT aktualnie wymienia się m.in. sztuczną inteli-gencję, uczenie maszynowe, technologie chmurowe i związaną z nimi wirtualizację zasobów informatycznych, Internet rzeczy, technologię blockchain oraz adaptacyj-ne architektury związane z cyberbezpieczeństwem. Niezmiennie od kilku lat wśród tych zestawień ważne miejsce zajmują platformy chmurowe oraz wirtualizacja zasobów. Technologia ta ma aktualnie coraz więcej różnorodnych zastosowań. Przynosi ona wymierne korzyści w zakresie organizacji IT, dlatego też szybko wchodzi do powszechnego użytku.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Bezpieczeństwo jako najważniejsze wyzwanie koncepcji Internetu rzeczy

The Internet of Things (IoT) is based on constant technological progress and is associated with t... more The Internet of Things (IoT) is based on constant technological progress and is associated with the existence of the global network connecting multiple devices and sensors that can independently exchange data. It is expected that IoT will find many applications in various fields of services and businesses, including power engineering, transport, industry, logistics, healthcare and IT sector. According to Gartner forecasts there will be 26 billion devices connected to the Internet in 2020, which means a huge increase of amount of data that will have to be stored and processed. IoT improves our lives, but also brings new threats and is a significant challenge for architects of security systems. Data privacy problems, weaknesses in the authorization and authentication systems, unsecured Web interfaces, software errors are the most common threats and vulnerabilities. In many devices, there is a lack of implemented security mechanisms that are able to mitigate existing vulnerabilities and prevent common threats. The aim of the article is to introduce the IoT and its applications, but most of all to identify and analyze the threats resulting from the Internet access of new devices.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain

The current challenge with defense against cyberattacks is that the speed and quantity of threats... more The current challenge with defense against cyberattacks is that the speed and quantity of threats often outpace human-centered cyber defense capabilities. That is why a new Artificial Intelligence driven approach may enhance the effectiveness of security controls. However, it can also be used by adversaries to create more sophisticated and adaptable attack mechanisms. Distinguishing three key AI capabilities (knowledge acquisition, human-like perception and decision making), the goal of this paper is to assert where within the cyber kill chain have AI capabilities already been applied, and which phase holds the greatest near-term potential given recent developments and publications. Based on literature review, authors see the strongest potential for deploying AI capabilities during the reconnaissance, intrusion, privilege escalation and data exfiltration steps of the cyber kill chain with other uses being deployed in the remaining steps.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of S The Potential of the Internet of Things in Knowledge Management System

Along with the increasing globalization and development of information and communication technolo... more Along with the increasing globalization and development of information and communication technology, business models are changing, and thus the need for innovative knowledge management is growing. Current knowledge management systems very often are not used optimally/effectively for decision-making because of the lack of real-time data. This article draws attention to the current trend in the area of organization management and IT management related to the emergence and growing popularity of the Internet of Things. The authors try to assess the potential of IoT in the context of improving knowledge processes (locating, acquiring, using, sharing and disseminating as well as preserving / coding / archiving / collecting), especially acquiring and sharing data and determining IoT impact on knowledge management and learning of the organization. The possible positive effects of implementing IoT in enterprises of various types, as well as threats and challenges that must be met by organiza...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data Quality Management in ERP Systems - Accounting Case

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Cloud computing jako nowy model biznesu : korzyści, zagrożenia i wyzwania dla zarządzania

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Podejście ilościowe i jakościowe w analizie ryzyka informatycznego w małych i średnich przedsiębiorstwach

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IT Risk Assessment: Quantitative and Qualitative Approach

— IT risk management currently plays more and more important role in almost all aspects of contem... more — IT risk management currently plays more and more important role in almost all aspects of contemporary organizations ’ functionality. It requires reliable and cyclical realization of its key task which is risk analysis. Literature of subject presents problems of risk analysis in different way, the most often skipped or selectively treated the problem of quantitative methods application for the purpose of risk analysis. The article presents the issue of one of the most significant stages of risk analysis which is IT risk assessment, especially focusing on chosen quantitative methods such as ALE (Annual Loss Expected) method, Courtney method, Fisher’s method, using survey research ISRAM model (Information Security Risk Analysis Method) and other derived ratios. There were also shortly presented chosen qualitative methods – FMEA (Failure Mode and Effects Analysis) and FMECA (Failure Mode and Effects Criticality Analysis), NIST SP 800-30 method and CRAMM methodology. Index Terms — IT r...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Towards Automated Modelling of Large-scale Cybersecurity Transformations: Potential Model and Methodology

Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Potential of the Internet of Things in Knowledge Management System

Annals of Computer Science and Information Systems, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Development of crowd investing on the basis of ICO crypto assets using block-options for the supply of electric generation capacity

Communication Papers of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Wybrane determinanty rozwoju rynku rynku informatycznego w Polsce

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Towards Industry 4.0: Functional and Technological Basis for ERP 4.0 Systems

Towards Industry 4.0 — Current Challenges in Information Systems, 2020

In the Industry 4.0 conception, due to the development of new information technologies and their ... more In the Industry 4.0 conception, due to the development of new information technologies and their implementation in management systems, there are developed systems with extended functionalities, new functional features and new technologies such as, for example, the Internet of Things, fog computing, big data, big management. These are ERP 4.0 systems. They increase the scope of automation and even robotize information processes, they are also able to transform information into knowledge, which increases the efficiency of decision-making processes and thus increases the efficiency of enterprises and organizations. The main aim of the chapter is to identify and discuss the features in the newly emerging ERP 4.0 system and also to analyze and classify the main contributions published on the topic of ERP 4.0 in management literature, seeking to give it a unique definition, discover the gaps still remaining in literature and outline future avenues of research in this domain. The main contribution of the chapter is developing the guidelines for structural and technological development of ERP-class systems, with particular emphasis on technological solutions of the ERP 4.0 system, such as cognitive technologies, big data, the Internet of Things, cloud computing and fog computing. The Authors attempts also to formulate a unique definition and features of the ERP system and outline future research directions in this area.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Business Challenges and Technological Innovations Applied in the ICT Platform for Occupational Activation of Senior Citizens

Proceedings of the 4th International Conference on Information and Communication Technologies for Ageing Well and e-Health, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Platforma internetowa jako innowacyjne narzędzie aktywizacji seniorów na rynku pracy

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection

Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of models for the tokenization of electric power industry basing on the blockchain technology

Communication Papers of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Genetic Algorithm for the Retailers’ Shelf Space Allocation Profit Maximization Problem

Applied Sciences, 2021

This paper discusses the problem of retailers’ profit maximization regarding displaying products ... more This paper discusses the problem of retailers’ profit maximization regarding displaying products on the planogram shelves, which may have different dimensions in each store but allocate the same product sets. We develop a mathematical model and a genetic algorithm for solving the shelf space allocation problem with the criteria of retailers’ profit maximization. The implemented program executes in a reasonable time. The quality of the genetic algorithm has been evaluated using the CPLEX solver. We determine four groups of constraints for the products that should be allocated on a shelf: shelf constraints, shelf type constraints, product constraints, and virtual segment constraints. The validity of the developed genetic algorithm has been checked on 25 retailing test cases. Computational results prove that the proposed approach allows for obtaining efficient results in short running time, and the developed complex shelf space allocation model, which considers multiple attributes of a...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Software Quality Improvement by Application of a Component-Based Software Meta-Architecture

Designing software is a complex process which requires a lot of knowledge and experience. Every s... more Designing software is a complex process which requires a lot of knowledge and experience. Every software has a high-level architecture which can be represented as a set of taken design decisions. Software meta-architectures, architectural styles, and reference models are commonly used tools which help to shape the software architectures by delivering sets of already taken, and validated design decisions. The STCBMER is a component-based software meta-architecture founded on a set of simple pieces of architectural knowledge, called architectural principles. The authors of this publication have defined the STCBMER and its principles in previous works. The main aim and the contribution of this paper is to look for a correlation between a component-based software meta-architecture (STCBMER) and software quality attributes.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Bezpieczeństwo Internetu rzeczy. Wybrane zagrożenia i sposoby zabezpieczeń na przykładzie systemów produkcyjnych

Streszczenie: W opinii wielu ekspertów oraz firm analitycznych zagadnienia takie jak cyfryzacja, ... more Streszczenie: W opinii wielu ekspertów oraz firm analitycznych zagadnienia takie jak cyfryzacja, bezpieczeństwo IT oraz Internet rzeczy to zjawiska, które wyznaczały kierunek rozwoju poszczególnym branżom gospodarki w minionym roku i będą szczególnie istotne w przyszłości. Wśród nich znajduje się Internet rzeczy, wobec którego oczekuje się, że znajdzie wiele zastosowań w różnych dziedzinach, m.in. w energetyce, transporcie, przemyśle, opiece zdrowotnej. Jego zastosowania usprawniają nasze życie, ale stwarzają też nowe zagrożenia i stanowią wyzwanie dla architektów systemów bezpieczeństwa. Eksperci są zdania, że problemy z bezpieczeństwem IT sprzed lat powracają obecnie w nowych urządzeniach i dają hakerom wiele możliwości do cyberataków. Celem artykułu jest przybliżenie koncepcji Internetu rzeczy, obszarów jej zastosowań, ale przede wszystkim identyfikacja zagrożeń wynikających z zastosowań tej koncepcji. Artykuł zawiera również przegląd przypadków użycia Internetu rzeczy w obszarze produkcji, opis zagrożeń dla cyberbezpieczeństwa wynikających z poszerzania dostępu do sieci nowych urządzeń, a także przegląd istniejących zabezpieczeń w tej dziedzinie.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Wirtualizacja zasobów informatycznych organizacji. Analiza korzyści i wybranych programowych narzędzi wirtualizacyjnych

Streszczenie: Wirtualizacja została szybko zaadaptowana przez współczesne organizacje, gdyż oferu... more Streszczenie: Wirtualizacja została szybko zaadaptowana przez współczesne organizacje, gdyż oferuje wiele korzyści. Dzięki niej można uprościć istniejące środowisko IT, two-rząc przy tym dynamiczniejsze i bardziej elastyczne centrum przetwarzania danych o wysokim poziomie bezpieczeństwa, przy jednoczesnym obniżeniu nakładów inwesty-cyjnych oraz kosztów operacyjnych. Systemy do wirtualizacji są wciąż udoskonalane, zwiększane jest spektrum ich możliwości, co przyczynia się do coraz większego zaintere-sowania tymi rozwiązaniami. Obecnie na rynku istnieje wiele rozwiązań programowych wspomagających procesy wirtualizacji, które różnią się między sobą pod wieloma wzglę-dami. Celem artykułu jest przedstawienie istoty, podstawowych typów wirtualizacji, jej zastosowań i korzyści oraz popularnych systemów wirtualizacyjnych stosowanych w praktyce. Zastosowane metody badawcze to przegląd aktualnej literatury przedmiotu, analiza istniejących badań i wybranych przypadków zastosowań wirtualizacji oraz analiza przydatności wdrożenia omawianej technologii w praktyce. Wprowadzenie Różne organizacje badawcze zajmujące się analizą rynku IT publikują opraco-wania, w których określają trendy w branży nowoczesnych technologii na najbliż-sze lata. W raportach tych coraz modniejsze staje się pojęcie " disruptive innovation " , które określa nowe technologie mające szansę zmienić sposób funkcjono-wania organizacji, zmieniając diametralnie dotychczasowy porządek ekonomiczny. Wśród tych trendów w obszarze IT aktualnie wymienia się m.in. sztuczną inteli-gencję, uczenie maszynowe, technologie chmurowe i związaną z nimi wirtualizację zasobów informatycznych, Internet rzeczy, technologię blockchain oraz adaptacyj-ne architektury związane z cyberbezpieczeństwem. Niezmiennie od kilku lat wśród tych zestawień ważne miejsce zajmują platformy chmurowe oraz wirtualizacja zasobów. Technologia ta ma aktualnie coraz więcej różnorodnych zastosowań. Przynosi ona wymierne korzyści w zakresie organizacji IT, dlatego też szybko wchodzi do powszechnego użytku.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Bezpieczeństwo jako najważniejsze wyzwanie koncepcji Internetu rzeczy

The Internet of Things (IoT) is based on constant technological progress and is associated with t... more The Internet of Things (IoT) is based on constant technological progress and is associated with the existence of the global network connecting multiple devices and sensors that can independently exchange data. It is expected that IoT will find many applications in various fields of services and businesses, including power engineering, transport, industry, logistics, healthcare and IT sector. According to Gartner forecasts there will be 26 billion devices connected to the Internet in 2020, which means a huge increase of amount of data that will have to be stored and processed. IoT improves our lives, but also brings new threats and is a significant challenge for architects of security systems. Data privacy problems, weaknesses in the authorization and authentication systems, unsecured Web interfaces, software errors are the most common threats and vulnerabilities. In many devices, there is a lack of implemented security mechanisms that are able to mitigate existing vulnerabilities and prevent common threats. The aim of the article is to introduce the IoT and its applications, but most of all to identify and analyze the threats resulting from the Internet access of new devices.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain

The current challenge with defense against cyberattacks is that the speed and quantity of threats... more The current challenge with defense against cyberattacks is that the speed and quantity of threats often outpace human-centered cyber defense capabilities. That is why a new Artificial Intelligence driven approach may enhance the effectiveness of security controls. However, it can also be used by adversaries to create more sophisticated and adaptable attack mechanisms. Distinguishing three key AI capabilities (knowledge acquisition, human-like perception and decision making), the goal of this paper is to assert where within the cyber kill chain have AI capabilities already been applied, and which phase holds the greatest near-term potential given recent developments and publications. Based on literature review, authors see the strongest potential for deploying AI capabilities during the reconnaissance, intrusion, privilege escalation and data exfiltration steps of the cyber kill chain with other uses being deployed in the remaining steps.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of S The Potential of the Internet of Things in Knowledge Management System

Along with the increasing globalization and development of information and communication technolo... more Along with the increasing globalization and development of information and communication technology, business models are changing, and thus the need for innovative knowledge management is growing. Current knowledge management systems very often are not used optimally/effectively for decision-making because of the lack of real-time data. This article draws attention to the current trend in the area of organization management and IT management related to the emergence and growing popularity of the Internet of Things. The authors try to assess the potential of IoT in the context of improving knowledge processes (locating, acquiring, using, sharing and disseminating as well as preserving / coding / archiving / collecting), especially acquiring and sharing data and determining IoT impact on knowledge management and learning of the organization. The possible positive effects of implementing IoT in enterprises of various types, as well as threats and challenges that must be met by organiza...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data Quality Management in ERP Systems - Accounting Case

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Cloud computing jako nowy model biznesu : korzyści, zagrożenia i wyzwania dla zarządzania

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Podejście ilościowe i jakościowe w analizie ryzyka informatycznego w małych i średnich przedsiębiorstwach

Bookmarks Related papers MentionsView impact